Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3571662.3571677acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccipConference Proceedingsconference-collections
research-article

Privacy Protection Technology in Supply Chain-oriented Blockchain

Published: 03 January 2023 Publication History

Abstract

The supply chain refers to the process that starts from the production of parts, goes through transportation, storage and other processes, and finally forms products and sells them. The supply chain generally consists of suppliers, manufacturers, sales companies, consumers and other elements. With the increase in the scale of the supply chain and the increase in transactions, it becomes difficult to track the transportation process of goods, and the transaction reliability is low, which leads to problems such as low logistics and transportation efficiency, difficulty in market supervision, and difficulty in confirming the ownership of goods. Therefore, we need a means to informatize the supply chain. Blockchain consists of blocks containing information connected in chronological order. Compared with traditional networks, blockchain has two core characteristics: one is the immutability of data, and the other is decentralization. Its structure naturally fit the characteristics and development trend of the supply chain, so we can consider using blockchain technology to solve the problems in the supply chain, so as to realize the innovative development of the supply chain.
Our article first gives the concrete scheme of applying blockchain technology to supply chains. From the four aspects of data collection, uploading, storage and use, we discussed how those various blockchain privacy protection technologies protect and enhance data privacy in the supply chain, including public key cryptography, digital signature, secret sharing technology, threshold cryptography, access control, and secure multi-party computation. We also predict the possible development direction of blockchain technology which is applied to supply chain.

References

[1]
Angelo De Caro and Vincenzo Iovino. 2011. jPBC: Java pairing based cryptography. In 2011 IEEE symposium on computers and communications (ISCC). IEEE, 850–855.
[2]
Seung Joo Kim, Sung Jun Park, and Dong Ho Won. 1996. Convertible group signatures. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 311–321.
[3]
Bernard J La Londe and James M Masters. 1994. Emerging logistics strategies: blueprints for the next century. International journal of physical distribution & logistics management (1994).
[4]
Chenlei Liu, Feng Xiang, and Zhixin Sun. 2022. Multiauthority Attribute-Based Access Control for Supply Chain Information Sharing in Blockchain. Security and Communication Networks 2022 (2022).
[5]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review(2008), 21260.
[6]
Amit Sahai and Brent Waters. 2005. Fuzzy identity-based encryption. In Annual international conference on the theory and applications of cryptographic techniques. Springer, 457–473.
[7]
Q Wang, F Li, Z Wang, 2020. Principle and core technology of blockchain [J]. Journal of Frontiers of Computer Science and Technology 14, 10(2020), 1621–1643.
[8]
Quansi Wen, Ying Gao, Zhiling Chen, and Dapeng Wu. 2019. A blockchain-based data sharing scheme in the supply chain by IIoT. In 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS). IEEE, 695–700.
[9]
Keping Yu, Liang Tan, Caixia Yang, Kim-Kwang Raymond Choo, Ali Kashif Bashir, Joel JPC Rodrigues, and Takuro Sato. 2021. A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial internet of things settings. IEEE Internet of Things Journal(2021).
[10]
J. Zhang. 2016. New Construction of Lattice-based Programmable Hash Function. Journal of Cryptologic Research(2016).
[11]
J Zhao, XW Zeng, and ZC Guo. 2018. Comparison and Analysis of Domestic and International Common Hash Algorithms [J]. Journal of Network New Media 5 (2018), 58–62.

Index Terms

  1. Privacy Protection Technology in Supply Chain-oriented Blockchain

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCIP '22: Proceedings of the 8th International Conference on Communication and Information Processing
    November 2022
    219 pages
    ISBN:9781450397100
    DOI:10.1145/3571662
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 January 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Blockchain
    2. Privacy Preserving
    3. Supply chain

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • Science and Technology R&D Plan of CSCEC

    Conference

    ICCIP 2022

    Acceptance Rates

    ICCIP '22 Paper Acceptance Rate 61 of 301 submissions, 20%;
    Overall Acceptance Rate 61 of 301 submissions, 20%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 107
      Total Downloads
    • Downloads (Last 12 months)57
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 06 Oct 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media